US10659251B2 - Ring protection network division - Google Patents
Ring protection network division Download PDFInfo
- Publication number
- US10659251B2 US10659251B2 US16/072,314 US201616072314A US10659251B2 US 10659251 B2 US10659251 B2 US 10659251B2 US 201616072314 A US201616072314 A US 201616072314A US 10659251 B2 US10659251 B2 US 10659251B2
- Authority
- US
- United States
- Prior art keywords
- network
- ring protection
- owner
- protection network
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 29
- 238000010586 diagram Methods 0.000 description 8
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000003139 buffering effect Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000007363 ring formation reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/423—Loop networks with centralised control, e.g. polling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4675—Dynamic sharing of VLAN information amongst network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L2012/421—Interconnected ring systems
Definitions
- network modules e.g., Ethernet switches, Virtual Connect fabrics, etc.
- Network modules may be linked in a variety of topologies.
- a ring topology provides a redundant path between each network module connected in a ring.
- a network module may be connected between two other network modules using two separate communication links.
- the two communication links may send data, messages, packets, etc. in opposite directions (e.g., clockwise and counterclockwise) around the ring.
- FIG. 1A illustrates a schematic diagram of an example ring protection network system including network modules with ring division managers implemented in accordance with an aspect of this disclosure.
- FIG. 1B illustrates a schematic diagram of multiple ring protection networks created from the ring protection network system of FIG. 1A using the example ring division managers in accordance with an aspect of this disclosure.
- FIG. 2 a block diagram of an example ring division manager that may be used to implement the ring division managers in the network modules of the ring protection networks of FIGS. 1A and/or 1B .
- FIG. 3 is a protocol diagram of example communications between ring protection network modules that may each be implemented by the ring protection network modules of FIGS. 1A and 1B and utilized by the ring division manager of FIG. 2 in accordance with an aspect of this disclosure.
- FIGS. 4A-4E schematically illustrates an example division of the example ring protection network of the system of FIG. 1A into the example ring protection networks of FIG. 1B .
- FIG. 5 is a flowchart representative of example machine readable instructions that may be executed to implement the ring division manager of FIG. 2 in accordance with an aspect of this disclosure.
- FIG. 6 is a flowchart representative of example machine readable instructions that may be executed to implement the network modules of FIG. 1 including the ring division manager of FIG. 2 in accordance with an aspect of this disclosure.
- FIG. 7 is a block diagram of an example processor platform capable of executing the instructions of FIGS. F1 and/or F 2 to implement the A 1 of FIG. B.
- Examples disclosed herein involve a ring protection network module to facilitate dividing a ring protection network into multiple ring protection networks.
- ring protection network modules may configure new ring protection networks from a single ring protection network by automatically selecting an owner network module for the new ring protection networks.
- the ring protection networks may include ring protection networks, in which an owner of the ring protection network controls communication between the ring protection network (e.g., a management network) and another network (e.g., a service network) and preserves the integrity of the ring protection network ((e.g., by preventing loops in customer traffic within the ring protection network or between the ring protection network and a service network).
- Datacenters may include a plurality of servers or a plurality of enclosures including the servers. Communication between the servers may be facilitated using network modules.
- the example network modules may be configured in a management network ring, and the network modules may additionally be connected to a service network of a plurality of customer devices. Loops between the network modules and the service network may overload customer traffic causing performance degradation. Furthermore, disconnecting network modules may cause issues with managing loops in the customer traffic. For example, problems may arise when a new ring protection network that is created from a previous ring protection network (by disconnecting and rejoining two end network modules) does not include or identify an owner as the newly created ring protection network may then create a loop in the customer traffic with no owner to prevent the loop. In examples herein, when a newly created ring protection network is formed within a threshold period of time, an owner may be automatically identified or selected to ensure proper operation of the newly formed ring protection networks.
- ring protection network modules and protocols facilitate automatic configuration of ring protection networks (e.g. management ring protection networks, such as a ring protection network) created from a ring protection network. More specifically, ring division managers of example ring protection network modules may detect when two ring protection network modules are disconnected from one another, detect a reconnection to another ring protection network module to form a new ring protection network, and determine a single owner of the newly created ring protection network from the previous ring protection network. The owner of the newly created ring protection networks may then establish a single uplink from the ring protection networks to a service network to prevent customer traffic loops in the ring protection networks or between the ring protection networks and the service network.
- ring protection networks e.g. management ring protection networks, such as a ring protection network
- ring division managers of example ring protection network modules may detect when two ring protection network modules are disconnected from one another, detect a reconnection to another ring protection network module to form a new ring protection network, and determine a single owner of
- a ring protection network is divided into multiple ring protected networks when the multiple ring protected networks form multiple disjoined ring protection networks comprised of the same network modules from the original ring protection network.
- FIG. 1A illustrates a ring protection network system 100 including a management ring protection network 120 .
- the management ring protection network 120 comprises ring protection network modules 102 a - 102 f configured in a ring.
- the example network modules 102 a - 102 f of FIG. 1A may be referred to herein collectively as the network modules 102 .
- the network modules 102 include ring division managers 110 constructed in accordance with this disclosure.
- the ring division managers 110 of FIG. 1 automatically configure newly formed ring protection networks created from the network modules 102 of the ring protection network 120 (e.g., by identifying or assigning owners for the newly formed ring protection networks)
- the ring protection network in FIG. 1A is formed into a “ring” as each network module 102 is linked to two other network modules 102 in a ring formation such that network module 102 a is connected to network module 102 b , which is connected to network module 102 c , which is connected to network module 102 f , which is connected to network module 102 e , which is connected to network module 102 d , which is connected to network module 102 a to complete the ring protection network.
- network modules are considered connected to one another when the network modules (e.g., the network modules 102 a - 102 f ) are directly communicatively coupled using a dedicated wired connection (e.g., an Ethernet connection) and disconnected from one another when the network modules are no longer directly communicatively coupled.
- the example dedicated wired connection may facilitate communication between the network modules using a variety of protocols (e.g., see FIG. 3 ).
- the example system 100 of FIG. 1 may control a datacenter (e.g., a system of servers, etc.) that communicates or provides services to a service network 130 .
- the example service network 130 may include a plurality of client or customer devices (e.g., computers, mobile devices, or any other type of computing device) that may access information in the datacenter of the system 100 .
- the ring protection network 120 of FIG. 1A may include a single uplink 122 to the service network 130 to prevent a loop in customer traffic within the ring protection network 120 .
- the network modules 102 may facilitate communication between servers in communication with each of the network modules 102 .
- each of the network modules 102 of FIG. 1A may manage communication with one or more servers.
- the network modules 102 may be configured in pairs to manage communications for a server enclosure having a plurality of servers.
- the pairs of network modules 102 may provide redundancy or backup services in the event one of the network modules 102 of a pair fails.
- the example ring protection networks 120 of FIG. 1A may be a G.8032 network.
- the ring protection network 120 may be divided into multiple ring protection networks using the ring division managers 110 of the network modules 102 (e.g., two ring protection networks of three network modules, three ring protection networks of two network modules, two ring protection networks, one with four network modules and one with 2 network modules, etc.).
- the ring division managers 110 may facilitate division of the ring protection network 120 into two ring protection networks 130 , 140 as illustrated in FIG. 1B (e.g., see FIGS. 4A-4E ) using communication protocols (see FIG. 3 ) of the network modules 102 in accordance with aspects of this disclosure.
- FIG. 1B e.g., see FIGS. 4A-4E
- FIG. 3 An example implementation of a ring division manager 110 of the network modules 102 that may be used to implement the ring division manager 110 of FIG. 1 in accordance with aspects of this disclosure is further discussed below in connection with FIG. 2 .
- a first ring protection network 140 is formed from the network modules 102 a , 102 b , 102 c of FIG. 1A and a second ring protection network 150 is formed from the network modules 102 d , 102 e , 102 f of FIG. 1A .
- the network module 102 c may be disconnected (e.g., by a user, switch, etc.) from the network module 102 f and the network module 102 a may be disconnected (e.g., by a user, switch, etc.) from the network module 102 d .
- the network module 102 c may be connected to the network module 102 a within a threshold period of time (e.g., a predetermined or user-designated, threshold period of time, such as 10 seconds, 20 seconds, etc.) to form the first ring protection network 140 and the network module 102 d may be connected to the network module 102 f to create the second ring protection network 150 with the threshold period of time.
- a threshold period of time e.g., a predetermined or user-designated, threshold period of time, such as 10 seconds, 20 seconds, etc.
- the system 100 of FIGS. 1A and 1B may be configured to create a different type of management network (e.g., a linear network).
- the ring division managers 110 of the network modules 110 may identify or establish owners of the ring protection networks 140 , 150 to maintain/establish two active uplinks 122 , 152 , respectively, with the service network 130 (e.g., from the network modules 102 b , 102 e ). Further, the owner may disconnect links between the network modules to prevent loops in the customer traffic once connected to the service network 130 .
- the two newly formed ring protection networks 140 , 150 of FIG. 1B may continue to operate as G.8032 networks formed from the single G.8032 network of FIG. 1B .
- FIG. 2 is a block diagram of an example ring division manager 200 that may be used to implement the ring division managers 110 in the network modules 102 of FIGS. 1A and 1B .
- the ring division manager 200 includes a ring connection monitor 210 and an owner selector 220 .
- the ring connection monitor 210 monitors connections of the network modules 102 and detects disconnections/reconnections from/to other network modules 102 of a ring protection network and the owner selector 220 configures owners of newly formed ring protection networks from the ring protection network.
- the network modules 102 of the ring protection networks 120 , 140 , 150 send and receive owner identifications (e.g., MAC addresses, serial numbers, internet protocol (IP) addresses, etc.) to/from one another.
- the network modules 102 may utilize a continuity check protocol (CCP) to communicate with adjacent (neighboring) network modules 102 in the ring protection network.
- CCP continuity check protocol
- the network module 102 b may periodically (or aperiodically) send continuity check messages to the network modules 102 a , 102 c .
- the network module 102 b may periodically (or aperiodically) receive continuity check messages from the network modules 102 a , 102 c .
- the example continuity check messages may include an owner identification that indicates the owner of the ring protection network (e.g., the ring protection networks 110 , 120 of FIG. 1 ) of the network module 200 .
- the owner network modules may broadcast the identifier of the owner (e.g., MAC addresses, serial numbers, internet protocol (IP) addresses, etc.) to all other network modules 102 in the ring protection network using an owner selection protocol (OSP).
- OSP owner selection protocol
- the example network modules 102 may include ring protection managers to provide owner services (e.g., disabling customer traffic links, establishing uplinks, etc.).
- the ring connection monitor 210 of FIG. 2 analyzes the messages received via the CCP and the OSP to detect disconnections and reconnections in the ring protection networks. For example, if the network module determines that a CCP has not been received, the ring connection monitor 210 may determine that the network module 102 is an end network module of a disconnected portion of the ring protection network. Accordingly, the ring connection monitor 210 may track signal fail conditions based on the CCP messages to determine whether the network module has been disconnected and reconnected.
- the owner selector 220 selects an owner of a ring protection network using any suitable protocol.
- the owner selector 220 may determine whether to select a new owner of the ring protection network based on whether there is communication with an owner. For example, in the event that an OSP message is not received for a period of time (e.g., 1 second, 2 seconds, etc.), the owner selector 220 may determine that the network module has been disconnected from the ring protection network because there is no message from the owner. The owner selector 220 may determine that its network module is an end network module.
- the owner selector 220 may set its network module may as owner for its ring protection network (e.g., the newly created ring protection network that does not include the owner of a previous/original network). Accordingly, after setting its network module as owner, the end network module may begin broadcasting OSP messages to the remaining network modules of the newly formed ring protection network. Furthermore, the end network module begins handling owner operations to ensure the integrity of the ring protection network and prevent customer traffic loops in the network. In some examples, if two end network modules are set to owner, a protocol may be used to select a single owner for the new ring protection network (e.g., a network module with the lower MAC address).
- the end network module may deactivate communication links of customer traffic between the end network module and adjacent network modules until all network modules of the newly formed ring protection network recognize the new owner.
- the owner may activate respective uplinks from the newly formed ring protection networks via a management port selection protocol (MPSP).
- MPSP management port selection protocol
- the owner selector 220 of one of the network modules that is not an owner receives an OSP message that is different from a previously received OSP message (e.g., a message received from the owner of the original ring protection network)
- the owner selector 220 of the non-owner network module may change its owner to the new owner network.
- the ring division manager 110 may enable the network modules to resume normal operation despite detecting a disconnection from neighbor modules as the respective network module continue to receive broadcasted OSP messages corresponding to the same owner. Accordingly, a threshold period of time (e.g., 10 seconds, 20 seconds, etc.) may be used to determine whether to reconfigure a network of the network modules.
- FIGS. 4A-4E illustrate an example division of a ring protection network using the ring division manager 200 of FIG. 2 in accordance with examples herein.
- any of the ring connection monitor 210 , the owner selector 220 , and/or, more generally, the example ring division manager 200 could be implemented by at least one of an analog or digital circuit, a logic circuit, a programmable processor, an application specific integrated circuit (ASIC), a programmable logic device (PLD) and/or a field programmable logic device (FPLD).
- ASIC application specific integrated circuit
- PLD programmable logic device
- FPLD field programmable logic device
- At least one of the ring connection monitor 210 and/or the owner selector 220 is/are hereby expressly defined to include a tangible machine readable storage device or storage disk such as a memory, a digital versatile disk (DVD), a compact disk (CD), a Blu-ray disk, etc. storing the executable instructions.
- the example ring division manager 200 of FIG. 2 may include at least one element, process, and/or device in addition to, or instead of, those illustrated in FIG. 2 , and/or may include more than one of any or all of the illustrated elements, processes and devices.
- FIG. 3 is a protocol diagram of example communications between module link ports 300 a , 300 b that may each be implemented by the network module 200 of FIG. 2 in accordance with an aspect of this disclosure.
- the module link ports 300 a , 300 b may represent connections to the network modules 102 a , 102 d of FIG. 1A or 1B or the network module 200 of FIG. 2 .
- the link ports 300 a , 300 b include a VLAN 4095 communication link and a VLAN 4092 communication link (though any VLAN 1 -VLAN 4094 may be used for customer traffic).
- the VLAN 4095 communication link may be used as a communication link for a management network ring of a ring protection network (to communicate with the other network modules 102 ) and the VLAN 4092 may be used for customer traffic (e.g., to communicate with the service network 130 ).
- the VLAN 4095 communication link may be used to send CCP communications, OSP communications, G.8032 communications, and MPSP communications.
- the network modules 102 may send/receive an owner identification corresponding to an owner of the network modules 102 of the link ports via the CCP protocol of FIG. 3 .
- the network modules 102 may send owner information via the OSP protocol.
- the ring division manager 200 analyzes the CCP and OSP communications to identify disconnections in the ring protection network 120 and/or reconnections between the network modules to create the new ring protection networks 140 , 150 .
- the owner selector 220 may then establish an owner to disable uplinks or send instructions to disable uplinks via the G.8032 protocol.
- the owner of the network modules may then activate an uplink or send instructions to activate an uplink via the MPSP protocol illustrated in FIG. 3 .
- the communication protocols utilized in the VLAN 4095 communication link of FIG. 3 may be used to detect disconnections in a ring protection network and creation of new ring protection networks as well establish owners of the new ring protection networks in accordance with aspects of this disclosure.
- FIGS. 4A-4E schematically illustrates an example division over time of the example ring protection network of the system of FIG. 1A into the example ring protection networks of FIG. 18 in accordance with an aspect of this disclosure.
- the MAC address (MAC) of the respective network modules 102 along with the owner address (OWNER) of the respective network modules 102 is indicated with the corresponding network module at that particular moment in time of the FIGS. 4A-4E .
- the connections between the modules 102 of FIGS. 4A-4C may include the communication links (e.g., the VLAN 4095 and the VLAN 4092 ) of FIG. 3 .
- the communication links e.g., the VLAN 4095 and the VLAN 4092
- the network module 102 b is the owner of the original ring protection network 120 (both OWNER and MAC are “3”).
- the FIGS. 4A-4E sequentially show the network modules 102 a - 102 f dividing to form two ring protection networks of the network modules 102 a - 102 c and 102 d - 102 f .
- clashed lines indicate a deactivated link in customer traffic (e.g., VLAN 4092 ) between the adjacent network modules, though the management communication (e.g., VLAN 4095 ) will be active.
- the network module 102 b serves as the owner of the ring protection network 120 , with a single uplink 122 to the customer network and loop prevention via a deactivated customer link with the network module 102 a .
- the links 402 between the network module 102 a and the network module 102 d and between the network module 102 c and the network module 102 f are disconnected. In some examples, the links are disconnected simultaneously (or nearly simultaneously) or they may be disconnected one after the other (e.g., within 1 second, 2 seconds, etc.).
- the connection 402 of FIG. 4A between the network modules 102 a , 102 d is disconnected (e.g., a user unplugs the wire from one of the network modules 102 a , 102 d , a switch disconnects the wires, etc.).
- the ring division managers of the network module 102 a may determine that an owner is present (from and OSP message from the network module 102 b ) but that there is a disconnection from the network module 102 d (due to not receiving a CCP message from 102 d ).
- the example network module 102 d may also determine that an owner is present (from the OSP message received from the network module 102 b via the connection to the network module 102 e ) but that there is a disconnection from the network module 102 a (due to not receiving a CCP message from 102 a ).
- the connection 404 of FIGS. 4A and 4B between the network modules 102 c , 102 f is disconnected. Accordingly, during a period of time in FIG. 4C , the network module 102 c may determine that an owner is still present (due to OSP message from the network module 102 b ) but there was a disconnection from the network module 102 f (due to no longer receiving a CCP message from the network module 102 f ).
- the network module 102 f may determine that an owner is no longer present (due to no longer receiving an OSP from the network module 102 b ) and there was a disconnection from the network module 102 d (due to no longer receiving CCP messages from the network module 102 d ).
- the network module 102 f may be the first network module of the network modules 102 d , 102 e , 102 f to determine that no owner is present because it was nearest network module to the owner network module 102 b in the ring after the disconnection of the connection 402 between the network modules 102 a , 102 d .
- FIG. 4C the network module 102 f may be the first network module of the network modules 102 d , 102 e , 102 f to determine that no owner is present because it was nearest network module to the owner network module 102 b in the ring after the disconnection of the connection 402 between the network modules 102 a , 102 d .
- the ring connection monitor 210 of the network module 102 f may determine that the network module 1021 is an end network module of a ring protection network without an owner. Meanwhile, the network modules 102 d , 102 e in FIG. 4C are waiting for an OSP message from the network module 102 f.
- the new ring protection networks 140 , 150 are created by new connection 442 between network modules 102 a , 102 c and the new connection 452 between network modules 102 d , 102 f , respectively.
- the ring connection monitor 210 of the network modules 102 a , 102 c detected a disconnection from the network modules 102 d , 102 f , respectively, the ring connection monitors continued to detect a connection with the owner network module 102 b .
- the newly formed ring protection network 140 may continue to operate with the network module 102 b as owner.
- the network module 102 f sets itself as owner of the new ring protection network 150 .
- the network module 102 f deactivates customer traffic with its adjacent network modules 102 e , 102 d to configure the newly formed ring protection network 150 .
- the owner network module 102 f begins broadcasting its owner identifier in OSP messages to the other network modules 102 e , 102 f of the ring protection network 150 .
- the network modules 102 e , 102 f change their owner to the new owner modules 102 f for the new ring protection network 150 .
- the owner network module 102 f establishes an uplink 152 with the service network 130 and activates one of the customer traffic links to an adjacent network module (the network module 102 e in FIG. 4E ) to enable the new ring protection network 150 to manage customer traffic of the service network 130 .
- FIG. 5 A flowchart representative of example machine readable instructions for implementing the ring division manager 200 of FIG. 2 is shown in FIG. 5 .
- the machine readable instructions comprise a program/process for execution by a processor such as the processor 712 shown in the example processor platform 700 discussed below in connection with FIG. 7 .
- the program/process may be embodied in executable instructions (e.g., software) stored on a tangible machine readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray disk, or a memory associated with the processor 712 , but the entire program/process and/or parts thereof could alternatively be executed by a device other than the processor 712 and/or embodied in firmware or dedicated hardware.
- a tangible machine readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray disk, or a memory associated with the processor 712 , but the entire program/process and/or parts thereof could alternatively be executed by a device other than the processor 712 and/or embodied in firmware or dedicated hardware.
- the process 500 of FIG. 5 begins with an initiation of the ring division manager 200 (e.g., upon startup, upon instructions from a user, upon startup of a device implementing the ring division manager 200 (e.g., the network modules 102 ), etc.).
- the example process 500 of FIG. 5 may be executed to configure a ring protection network (e.g., the ring protection network 150 ) formed from network modules of a previous ring protection network (e.g., the ring protection network 120 ).
- the ring connection monitor 210 detects a disconnection between a first ring protection network module and a second ring protection network module.
- the ring connection monitor 210 of the network module 102 f may determine that CCP messages have not been received from the network module 102 c , thus detecting a disconnection.
- the ring connection monitor 210 detects a connection between the first network module and a third network module.
- the ring connection monitor 210 of the network module 102 f may determine that CCP messages are being received from a different network module (i.e., the network module 102 d rather than the network module 102 c ), thus determining connection to a different network module.
- the owner selector 220 determines an owner of the second ring protection network based on whether an owner of the first ring protection network is included within the second ring protection network. For example, at block 530 , the owner selector 220 determines whether OSP messages have been received after the disconnection. In some examples, if OSP messages have been received, then the owner selector 220 may not change the owner. In some examples, if the OSP messages indicated an owner different from a previous owner of the network module, then the owner selector 220 may change the owner of its network module. If, however, the owner selector 220 determines that no owner messages have been received, the owner selector 220 may set its network module as the owner of the second ring protection network.
- FIG. 6 A flowchart representative of example machine readable instructions for implementing the network modules 102 of FIGS. 1A, 1B is shown in FIG. 6 .
- the machine readable instructions comprise a program/process for execution by a processor such as the processor 712 shown in the example processor platform 700 discussed below in connection with FIG. 7 .
- the program/process may be embodied in executable instructions (e.g., software) stored on a tangible machine readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray disk, or a memory associated with the processor 712 , but the entire program/process and/or parts thereof could alternatively be executed by a device other than the processor 712 and/or embodied in firmware or dedicated hardware.
- a tangible machine readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray disk, or a memory associated with the processor 712 , but the entire program/process and/or parts thereof could alternatively be executed by a device other than the processor 712 and/or embodied in firmware or dedicated hardware.
- the process 600 of FIG. 6 begins with an initiation of a network module 102 .
- the example process 600 of FIG. 6 may be executed to implement any one of the network modules 102 of the ring protection network 120 to enable configuration of a new ring protection network (e.g., the ring protection networks 140 , 150 ) that is created from network modules 102 of the ring protection network 120 .
- the ring connection manager 210 of a network module 102 determines whether a CCP message was received from adjacent network modules 102 . If CCP messages were received, control returns to block 602 to check for the next CCP messages.
- the network module 102 determines whether it is the owner of the ring protection network 120 (block 604 ). If the network module 102 is the owner of the ring protection network 120 (e.g., owner ID matches ID of the network module 102 , similar to the network module 102 b of FIG. 4D ), then control returns to block 602 to continue to monitor for CCP messages. If, at block 604 , the network module 102 is not the owner, then the network module determines whether it is in communication with the owner (block 606 ). For example, at block 606 the network module determines whether an OSP message from an owner has been received within a previous time period.
- the network module 102 determines that it is in communication with the ring protection network owner (e.g., similar to network modules 102 a , 102 c of FIG. 4D , then control returns to block 602 to continue monitoring for CCP messages. If, at block 606 , the network module is not in communication with the owner (e.g., similar to network module 102 f of FIG. 4D ), then, the network module 102 determines whether the ring protection network is implementing ring protection. If ring protection is not being implemented (block 608 ), then control returns to block 602 . If ring protection is being implemented (block 608 ), then the network module deactivates customer traffic to/from the adjacent network modules.
- the network module 102 sets itself as owner of a new ring protection network (e.g., a ring protection network).
- the network module sends new owner ID via CCP messages to adjacent network modules and sends an owner message via OSP at block 616 .
- the network module determines whether an owner ID has been received (from other network modules in the new ring protection network) that is different from the network modules own identifier. If, at block 618 , the network module 102 receives an owner ID that is not different from the other network modules (i.e., the other network modules have accepted the network module as the new owner, similar to FIG. 4E ), then control advances to block 626 .
- the network module 102 determines whether to change owner (i.e., whether to stay owner or change to owner corresponding to different owner ID). For example, the network module may compare owner IDs and select the owner ID based on a certain criteria (e.g., which ID is greater, lesser, etc.). If the network module 102 , at block 620 , determines not to change the owner ID, control advances to block 626 . If, at block 620 , the network module 102 determines to change owner, then the network modules joins the new network by setting its owner status to the new owner (block 622 ). At block 624 , the network module 102 activates the customer traffic links to/from the adjacent network modules. After block 624 , the example process 600 ends. In some examples, control may return to block 610 .
- the network module 102 operates as owner of the new ring protection network. For example, at block 626 , the network module 102 continue to monitor CCP and OSM messages. The network module 102 , at block 626 , may further reactivate customer traffic links with adjacent network module 102 but prevent loops in the customer traffic in the new ring protection network. Furthermore, the network module 102 may establish an uplink (e.g., the uplink 152 ) at block 626 to the customer service network 130 for the new ring protection network. After block 626 , the example process 600 ends.
- FIGS. 5 and 6 may be implemented using coded instructions (e.g., computer and/or machine readable instructions) stored on a tangible machine readable storage medium such as a hard disk drive, a flash memory, a read-only memory (ROM), a compact disk (CD), a digital versatile disk (DVD), a cache, a random-access memory (RAM) and/or any other storage device or storage disk in which information is stored for any duration (e.g., for extended time periods, permanently, for brief instances, for temporarily buffering, and/or for caching of the information).
- a tangible machine readable storage medium is expressly defined to include any type of machine readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media.
- FIGS. 5 and 6 are used interchangeably. Additionally or alternatively, the example processes of FIGS. 5 and 6 may be implemented using coded instructions (e.g., computer and/or machine readable instructions) stored on a non-transitory computer and/or machine readable medium such as a hard disk drive, a flash memory, a read-only memory, a compact disk, a digital versatile disk, a cache, a random-access memory and/or any other storage device or storage disk in which information is stored for any duration (e.g., for extended time periods, permanently, for brief instances, for temporarily buffering, and/or for caching of the information).
- a non-transitory machine readable medium is expressly defined to include any type of machine readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media.
- FIG. 7 is a block diagram of an example processor platform 700 capable of executing the instructions of FIGS. 5 and 6 to implement the ring division manager 200 of FIG. 2 and/or the network modules of FIGS. 1A, 1B , respectively.
- the example processor platform 700 may be or may be included in any type of apparatus, such as a server, a personal computer, a mobile device, a network device, or any other type of computing device.
- the processor platform 700 of the illustrated example of FIG. 7 includes a processor 712 .
- the processor 712 of the illustrated example is hardware.
- the processor 712 can be implemented by at least one integrated circuit, logic circuit, microprocessor or controller from any desired family or manufacturer.
- the processor 712 of the illustrated example includes a local memory 713 (e.g., a cache).
- the processor 712 of the illustrated example is in communication with a main memory including a volatile memory 714 and a non-volatile memory 716 via a bus 718 .
- the volatile memory 714 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device.
- the non-volatile memory 716 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 714 , 716 is controlled by a memory controller.
- the processor platform 700 of the illustrated example also includes an interface circuit 720 .
- the interface circuit 720 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a peripheral component interconnect (PCI) express interface.
- At least one input device 722 is connected to the interface circuit 720 .
- the input device(s) 722 permit(s) a user to enter data and commands into the processor 712 .
- the input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint, and/or a voice recognition system.
- At least one output device 724 is also connected to the interface circuit 720 of the illustrated example.
- the output device(s) 724 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a light emitting diode (LED), a printer and/or speakers).
- the interface circuit 720 of the illustrated example thus, may include a graphics driver card, a graphics driver chip or a graphics driver processor.
- the interface circuit 720 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 726 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
- a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 726 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
- DSL digital subscriber line
- the processor platform 700 of the illustrated example also includes at least one mass storage device 728 for storing executable instructions (e.g., software) and/or data.
- executable instructions e.g., software
- Examples of such mass storage device(s) 728 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives.
- the coded instructions 732 of FIGS. 5 and/or 6 may be stored in the mass storage device 728 , in the local memory 713 in the volatile memory 714 , in the non-volatile memory 716 , and/or on a removable tangible machine readable storage medium such as a CD or DVD.
- the network modules of a ring protection network may detect a disconnection from a ring protection network, detect a reconnection to another network module, and set an owner for the newly created ring protection networks using CCP and OSP messages.
- the newly created ring network may preserve the integrity of the new created ring protection networks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2016/019710 WO2017146718A1 (en) | 2016-02-26 | 2016-02-26 | Ring protection network division |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190028298A1 US20190028298A1 (en) | 2019-01-24 |
US10659251B2 true US10659251B2 (en) | 2020-05-19 |
Family
ID=59686514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/072,314 Active US10659251B2 (en) | 2016-02-26 | 2016-02-26 | Ring protection network division |
Country Status (2)
Country | Link |
---|---|
US (1) | US10659251B2 (en) |
WO (1) | WO2017146718A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6834385B2 (en) * | 2016-11-15 | 2021-02-24 | 富士通株式会社 | Programs, information processing devices and information processing methods |
CN113079090A (en) * | 2020-01-06 | 2021-07-06 | 华为技术有限公司 | Traffic transmission method, node and system |
US11729022B2 (en) | 2021-12-17 | 2023-08-15 | Hewlett Packard Enterprise Development Lp | Uplink connectivity in ring networks |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7006434B1 (en) | 2000-02-10 | 2006-02-28 | Ciena Corporation | System for non-disruptive insertion and removal of nodes in an ATM sonet ring |
US7499647B2 (en) * | 2000-05-22 | 2009-03-03 | Opvista Incorporated | Fully protected broadcast and select all optical network |
US20100290340A1 (en) | 2009-05-15 | 2010-11-18 | Electronics And Telecommunications Research Institute | Method for protection switching |
CN102025584A (en) | 2010-11-30 | 2011-04-20 | 迈普通信技术股份有限公司 | G.8032-based ring network protecting method and system |
US20120224471A1 (en) | 2009-09-07 | 2012-09-06 | Kumar Madaiah Vinod | Method and system for ring protection switching |
US20130064071A1 (en) | 2010-05-10 | 2013-03-14 | Jüergen Bos | Ring node, an ethernet ring and methods for loop protection in an ethernet ring |
US8588060B2 (en) | 2009-09-29 | 2013-11-19 | Ciena Corporation | E-spring (G.8032) interworking to provide access protection |
US20150036546A1 (en) | 2012-09-05 | 2015-02-05 | Brocade Communications Systems, Inc. | Multiple ring identification and configuration protocol |
US20150085637A1 (en) | 2013-09-24 | 2015-03-26 | Cyan Inc. | Ethernet ring protection node |
US20160028588A1 (en) * | 2014-07-28 | 2016-01-28 | David Michael Colven | Method for identifying logical loops in ethernet networks |
US20160142225A1 (en) * | 2013-06-12 | 2016-05-19 | Mitsubishi Electric Corporation | Communication system, communication apparatus, and protection method |
US20160204976A1 (en) * | 2015-01-14 | 2016-07-14 | Rajnath Singh | Identifying the absence and presence of a ring protection link owner node in an ethernet network |
US20160352570A1 (en) * | 2015-05-28 | 2016-12-01 | Ciena Corporation | Interconnecting networks |
US20170063617A1 (en) * | 2015-08-26 | 2017-03-02 | Hariprasad Sudharshan | Seamless migration from rapid spanning tree protocol to ethernet ring protection switching protocol |
US20170180153A1 (en) * | 2015-12-21 | 2017-06-22 | Ciena Corporation | Systems and methods to detect and recover from a loop in an ethernet ring protected network |
-
2016
- 2016-02-26 WO PCT/US2016/019710 patent/WO2017146718A1/en active Application Filing
- 2016-02-26 US US16/072,314 patent/US10659251B2/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7006434B1 (en) | 2000-02-10 | 2006-02-28 | Ciena Corporation | System for non-disruptive insertion and removal of nodes in an ATM sonet ring |
US7499647B2 (en) * | 2000-05-22 | 2009-03-03 | Opvista Incorporated | Fully protected broadcast and select all optical network |
US20100290340A1 (en) | 2009-05-15 | 2010-11-18 | Electronics And Telecommunications Research Institute | Method for protection switching |
US20120224471A1 (en) | 2009-09-07 | 2012-09-06 | Kumar Madaiah Vinod | Method and system for ring protection switching |
US8588060B2 (en) | 2009-09-29 | 2013-11-19 | Ciena Corporation | E-spring (G.8032) interworking to provide access protection |
US20130064071A1 (en) | 2010-05-10 | 2013-03-14 | Jüergen Bos | Ring node, an ethernet ring and methods for loop protection in an ethernet ring |
CN102025584A (en) | 2010-11-30 | 2011-04-20 | 迈普通信技术股份有限公司 | G.8032-based ring network protecting method and system |
US20150036546A1 (en) | 2012-09-05 | 2015-02-05 | Brocade Communications Systems, Inc. | Multiple ring identification and configuration protocol |
US20160142225A1 (en) * | 2013-06-12 | 2016-05-19 | Mitsubishi Electric Corporation | Communication system, communication apparatus, and protection method |
US20150085637A1 (en) | 2013-09-24 | 2015-03-26 | Cyan Inc. | Ethernet ring protection node |
US20160028588A1 (en) * | 2014-07-28 | 2016-01-28 | David Michael Colven | Method for identifying logical loops in ethernet networks |
US20160204976A1 (en) * | 2015-01-14 | 2016-07-14 | Rajnath Singh | Identifying the absence and presence of a ring protection link owner node in an ethernet network |
US20160352570A1 (en) * | 2015-05-28 | 2016-12-01 | Ciena Corporation | Interconnecting networks |
US20170063617A1 (en) * | 2015-08-26 | 2017-03-02 | Hariprasad Sudharshan | Seamless migration from rapid spanning tree protocol to ethernet ring protection switching protocol |
US20170180153A1 (en) * | 2015-12-21 | 2017-06-22 | Ciena Corporation | Systems and methods to detect and recover from a loop in an ethernet ring protected network |
Non-Patent Citations (4)
Title |
---|
"G.8032 Ethernet Ring Protection Multiple Ring Topology", Alcatel Lucent, < https://infoproducts.alcatel-lucent.com/html/0_add-h-f/93-0267-HTML/7X50_Advanced_Configuration_Guide/G8032-MultiRing.html >, (Web Page), Retreived on Mar. 2, 2016, 23 pages. |
"ITU-T G.8032 Ethernet Ring Protection Switching", < http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cether/configuration/xe-3s/ce-xe-3s-book/ce-g8032-ering-pro.pdf >, (Web Page). Nov. 24, 2015, 28 pages. |
International Searching Authority, The International Search Report and the Written Opinion, dated Nov. 22, 2016, PCT/US2016/019710, 11 Pgs. |
Ryoo, J. D. et al., "Ethernet Ring Protection for Carrier Ethernet Networks", (Research Paper), Aug. 20, 2008, 8 pages. |
Also Published As
Publication number | Publication date |
---|---|
US20190028298A1 (en) | 2019-01-24 |
WO2017146718A1 (en) | 2017-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111095869B (en) | Method and system for high availability enhancement for computer networks | |
US11757932B2 (en) | Event driven route control | |
WO2020020144A1 (en) | Link switching method, link switching device, network communication system and computer readable storage medium | |
CN102299846B (en) | Method for transmitting BFD (Bidirectional Forwarding Detection) message and equipment | |
US8055765B2 (en) | Service take-over method based on apparatus disaster recovery, service transfer apparatus and backup machine | |
CN101854283B (en) | Communication method and equipment of RPR (Resilient Packet Ring) looped network | |
US10659251B2 (en) | Ring protection network division | |
CN103686854A (en) | Method and device for controlling AP | |
WO2016091094A1 (en) | Optical transport network protection switching method and device | |
CN101909006A (en) | BFD (Bidirectional Forwarding Detection) message sending and receiving methods as well as device and communication system thereof | |
US11171810B1 (en) | Misconfigured uplink identification | |
CN104125079A (en) | Method and device for determining double-device hot-backup configuration information | |
US10491421B2 (en) | Ring protection network module | |
RU2693903C1 (en) | Method, apparatus and processing system for expanded port | |
CN103051484A (en) | Method and system for processing session service and session border controller | |
CN108259289B (en) | Loop network abnormity protection method and device | |
CN102984490A (en) | Network video recorder | |
US10122588B2 (en) | Ring network uplink designation | |
CN110601972A (en) | Message transmission method and device and intelligent elastic architecture system | |
CN103684858A (en) | Method and relevant device for generating tenant network and processing label message | |
WO2015120581A1 (en) | Traffic loop detection in a communication network | |
CN115086219B (en) | Virtual router determining method, device and computer readable storage medium | |
CN103178972A (en) | Delimiting method, device and system for link failures | |
CN115460067B (en) | Method and system for high availability enhancement to computer networks | |
JP2009105625A (en) | Protective relay device and method of switching transmission data format |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MURRAY, CHRISTOPHER;REEL/FRAME:046600/0214 Effective date: 20160226 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |